Category Archives: Breach Reports

Oldsmar Water Treatment Facility Breach: What happened and what we learned.

Earlier this month, a Florida wastewater treatment plant’s computer system was compromised by an unknown threat actor. This hacker was able to remotely gain access via an employee’s login credentials and attempted to alter the chemical composition of the public water supply to dangerous levels. Thankfully, a plant operator was watching this all unfold and […]
Read More »

SolarWinds Breach Fallout: What happened and what we learned

On December 13, 2020 cybersecurity company FireEye announced they had discovered a state-of-the-art exploit that created a backdoor in SolarWind’s Orion application. This hack was then distributed to thousands of systems running this application as a routine update from the manufacturer. With no reason to suspect any issues, IT administrators all over the country unknowingly […]
Read More »

CyberSecure Solutions Security Bulletin (September 4, 2019)

Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and […]
Read More »

CyberSecure Solutions Security Bulletin (August 21, 2019)

Overview Phish Tale of the Week 23 Towns Across Texas Hit by Ransomware Attack European Central Bank Suffers Data Breach How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing attempts are often carried out with the purpose of tricking the target into downloading or accidentally running a malicious script on their devices. This example […]
Read More »

CyberSecure Solutions Security Bulletin (August 7, 2019)

Overview Phish Tale of the Week Cyber Attacks on the Rise US Utilities Have Become Targets How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week For this week’s Phish Tale of the Week, we’re taking a look at the phishing email that was sent to our HQ office that claims to be a promotional […]
Read More »

CyberSecure Solutions Security Bulletin (July 24, 2019)

Overview Phish Tale of the Week Sprint Breach Exposes Customer Data Critical Flaw Found In VLC Media Player How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week As is typical for most businesses, our HQ Office inbox receives the occasional phishing email attempting to trick an employee into sending the perpetrator some sort of […]
Read More »

Netizen Cybersecurity Bulletin (July 10, 2019)

Overview Phish Tale of the Week Microsoft’s BlueKeep Proves Vulnerable Critical Warning Issued for Samsung Cellphone Update App How Can Netizen Help? Phish Tale of the Week Phishing attempts are often carried out with urgent messages that are meant to provoke the victim to act without rationally thinking about the contents of the email. In […]
Read More »

Netizen Cybersecurity Bulletin (June 26, 2019)

Overview Phish Tale of the Week Vulnerability in TP-Link’s Wi-Fi Extenders Could Allow Remote Control to Attackers Latest Phishing Scam Impersonates Apple Support How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing email targeting […]
Read More »

Netizen Cybersecurity Bulletin (12 June 2019)

Overview Phish Tale of the Week Microsoft Urges Users to Patch BlueKeep Security Flaw U.S. Customs and Border Protection Data Breach How Can Netizen Help? Phish Tale of the Week Malicious actors are constantly finding new ways to target a big payday. In the newest trend, these cyber criminals are using secured websites to run […]
Read More »

Netizen Cybersecurity Bulletin (29 MAY 2019)

Overview Phish Tale of the Week First American Financial Corp. Leaks 800+ Million Records Google Begins Tracking “zero-day” Exploits How Can Netizen Help? Phish Tale of the Week One way a malicious actor can try to collect a business’ sensitive information is by targeting the business’ employees. Attempting to phish an employee requires some research […]
Read More »